[hope its fine to cross-post ipsec and ipsecme given how one is concluded, but 
may have
 more long-time subscribers]

We're looking for opinions about an IPsec profile for "Autonomic Control Plane"
draft-ietf-anima-autonomic-control-plane, or specifically 6.7.1.1.1 of:

https://raw.githubusercontent.com/anima-wg/autonomic-control-plane/be056679b9c9cac8c2d664958a3b91585b010a83/draft-ietf-anima-autonomic-control-plane/draft-ietf-anima-autonomic-control-plane.txt

Quick background so you do not need to read anything more than 6.7.1.1.1:

ACP builds an "overlay"  network with hop-by-hop IKEv2/ESP "tunnels". 
These hops are meant to be typical enterprise/WAN/DC software...Giga/Terrabit 
routers.

Hence some interest on side of the authors (me) to see how we can adopt the 
crypto
algorithm rementserofile of RFC8221 to minimize high-speed algorithm 
implementation 
requirements so that ACP would be as easy to adopt across various vendor crypto 
HW as
possible.

Note that ACP also supports DTLS, but we think that DLS would primarily
be used in lower-end devices, so crypto woould be done in software
there, hence we do not bother taking the step to try to optimize /
minimize the number of required algorithms.

Here is the adoption of the RFC8221 algorithms:

OTHERS                 - as in RFC8221 (MUST NOT / SHOULD NOT)
ENCR_NULL              - MUST NOT (require confidentiality of payload in ACP)
                         (was MUST in RFC8221)
ENCR_AES_GCM_16        - MUST
                         (was MUST in RFC8221)
ENCR_AES_CBC           - SHOULD if higher perf than ENCR_AES_GCM_16, else MAY   
                           
                         (was MUST in RFC8221)
ENCR_AES_CCM_8         - SHOULD if higher perf than ENCR_AES_GCM_16, else MAY   
                           
                         (was SHOULD in RFC8221)
ENCR_CHACHA20_POLY1305 - SHOULD with equal or higher perf than ENCR_AES_GCM_16, 
else MAY           
                         (was SHOULD in RFC8221)

To make life easy, we have one ESP MTI algo to interop, that's GCM_16.

Because packets will be hop-by-hop forwarded across multiple tunnels,

ACP has no legacy interop requirements. Aka: We only need to think about
the relevant algorithms for device types so old, that they would never
implement ACP (and we have to guess for those devices of course, but we
have some good experience of pre-standard vendor implementations).

Effectively, we downgrade and modify requirements for CBC, CCM_8 and POLY1305
acording to our understandings:

1. Given how we have one MTI (GCM_16), and no further need for legacy 
compatibility,
   there is no need for additional MTI (MUST), so the remaining desirable 
algorithms
   can be SHOULD or less.

2. A SHOULD only makes sense in the ACP use case if the actual performance is
   higher than that of the MTI, hence the opportunistic performance
   conditioned SHOULD in CBC and CCM_8. 

   Expectation is that those algos would be supported by a vendor if it
   can make it faster, and then that speed benefit would be had when
   connecting that vendors devices together.

3. POLY1305 is really desirable as crypto backup to the AES options, so
   the performance based SHOULD is not opportunistic as for CBC and
   CCM_8. Maybe the language is not 100% correct.
   
Maybe the language is not perfect. seems like i could leave out all the
"MAY" at the end and achieve the same.

Cheers
    Toerless

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to